I will skip obvious parts below this point and focus only on the main commands.

Use case #2

Follow the previous procedure with just two exceptions to move data from local to remote, and delete source files afterwards. First exception can be found inside authorized_keys file, second is the command used to transfer data.

Look at the parameters in the authorized_keys file on the remote machine (data user).